ZyXEL Communications 5 Series Manuale Utente
Chapter 14 Intrusion Detection and Prevention (IDP) Screens
ZyWALL 5/35/70 Series User’s Guide
283
14.3.4 Configuring The IDP Signatures Screen
Click SECURITY >IDP > Signature to see the ZyWALL’s “group view” signature screen
where you can view signatures by attack type. To search for signatures based on other criteria
such as signature name or ID, then click the Switch to query view link to go to the “query
view” screen.
where you can view signatures by attack type. To search for signatures based on other criteria
such as signature name or ID, then click the Switch to query view link to go to the “query
view” screen.
You can take actions on these signatures as described in
. To revert
to the default actions or to save sets of actions, go to the Backup & Restore screen.
Figure 167 SECURITY > IDP > Signature: Group View
The following table describes the labels in this screen.
Table 81 SECURITY > IDP > Signature: Group View
LABEL
DESCRIPTION
Signature Groups
Switch to
query view
query view
Click this hyperlink to go to a screen where you can search for signatures based on
criteria other than attack type.
criteria other than attack type.
Attack Type
Select the type of signatures you want to view from the list box. See
for information on types of signatures.
The table displays the signatures of the type that you selected. Click a column’s
header to sort the entries by that attribute.
header to sort the entries by that attribute.
Go To
Navigate between signatures found. This field is available only if there are more
signatures than that can be displayed on one screen.
signatures than that can be displayed on one screen.
Name
The (read-only) signature name identifies a specific signature targeted at a specific
intrusion. Click the hyperlink for more detailed information on the intrusion.
intrusion. Click the hyperlink for more detailed information on the intrusion.
ID
Each intrusion has a unique identification number. This number may be searched at
myZyXEL.com for more detailed information.
myZyXEL.com for more detailed information.
Severity
This field displays the level of threat that the intrusion may pose. See
for more information on intrusion severity.
Platform
This field displays the computer or network device operating system that the intrusion
targets or is vulnerable to the intrusion. These icons represent a Windows operating
system, a UNIX-based operating system and a network device respectively.
targets or is vulnerable to the intrusion. These icons represent a Windows operating
system, a UNIX-based operating system and a network device respectively.